Although many organizations have deployed
antivirus software, malicious software such as computer viruses, worms, and
Trojan horses continue to infect computer systems around the world. There
is no single reason for this apparent contradiction, but the current
situation indicates that the standard approach of deploying antivirus
software on each computer in your environment may not be sufficient.
Morever,
with more than 60,000 viruses existing today, managing and updating
anti-virus software can be both costly and cumbersome for many small to
large-sized businesses. These tools, however, are only as effective as the
most recently updated virus signature files.
iTechSolv adopt proactive defense-in-dept approach that goes
beyond perimeter security to protect customers information system assets
with zero-day vulnerability. iTechSolv alleviates the headaches associated
with managing anti-virus functionality and assures your company will be
ready when a virus attacks. Computer viruses are responsible for hundreds
of millions of lost dollars and countless hours of lost productivity - we
can help your organization prevent virus incidents before they can do
similar damage.
Early
network protocols, such as Telnet, RPC and FTP, were relatively simple and
required action by a dedicated hacker with a sustained connection to a
remote system to launch an attack.
In
the last ten years, applications have become much more complex, and
protocols are used to carry much richer content. These changes have been
exploited by attackers to develop more effective, content-based threats
that circumvent connection-oriented security and that also have the ability
to reproduce and spread automatically.
Content-based
threats are able to bypass connection-oriented Stateful-Inspection
firewalls because they are typically delivered via connections that are
inherently “trusted.” Content-based threats include viruses,
Trojans, worms, banned content and spam, and are readily propagated through
email, web pages and other real-time communications applications.
With
the many email viruses making headline news every few months, users are now
beginning to understand the potential dangers of opening an unsolicited
email - even if it's from someone they know! With grayware, users don't
even have to open an attachment or execute a program to become infected.
Just visiting a Web site that harbors this technology is enough to become a
victim. And while some types of grayware such as pop-ups may be viewed in
the same manner as spam - more of an annoyance that a true security threat
- there is a fine line between "harmless" grayware and those
types that can compromise valuable information such as credit card numbers,
passwords, and even a user's identity.
Bagel,
MyDoom, Netsky:A through Z. IT administrators faced a relentless attack of
worms and viruses, often with new variants popping up daily. Businesses
incurred major financial costs due to downtime. In the past two years,
however, viruses and worms have become criminal tools. Some, such as the
Badtrans and Orpheus worms, include keystroke loggers to steal passwords
and other critical company information. Others, such as MyDoom, opened
backdoors that allowed hackers to turn PCs into “Zombies” for
relaying spam email, launching distributed denial of service attacks, or
even for hosting illegal pornographic material —thus covering the
tracks of the true perpetrators.
It’s
no secret that the challenge of securing enterprise information assets is
rapidly growing in importance and complexity.
The
number of reported incidents of virus and worm attacks has increased
dramatically over the past several years, as has the cost of dealing with
these attacks. The combined costs related to damage and recovery from the
Code Red worm approached $2.5 billion, and the related costs for Nimda were
an additional $3
billion.
Network
security is now a mission-critical concern for enterprises, government
agencies, and organizations of all sizes. Today’s advanced threats
from cyber-terrorists, disgruntled employees, and hackers demand a
methodical approach to network security.
In
many industries enhanced security is not an option — it’s mandatory.
|